This resource is no longer available

You have heard the terms WAN, MAN, LAN and SAN along with tiered storage, ILM, SAS and SATA, among others. Learn how to leverage and align these and other storage access technologies to work for you to meet your specific needs.

Tiered storage is a popular topic associated with information lifecycle management (ILM). Tiered storage involves much more than deciding and managing what type of disk drives and storage subsystems should be used for online, near-line and offline storage pools. A storage access subject matter expert (SME) can help you find your way through the sea of technology options, requirements and vendor hype. Marc Staimer, President of Dragon Slayer Consulting, is your guide for this informative session.

This session assumes basic to moderate knowledge of storage and storage networking (SAN and NAS) practices and technologies. By attending this session you gain a better understanding of topics, including a look inside the mysterious generic networking cloud for metropolitan area networks (MAN) and wide area networks (WAN). Topics covered include LAN, MAN, WAN, SAN, along with IP, iSCSI, FC, SAS, SATA, FICON, WiFi, NAS, WAFS, virtualization and routing. If you need to learn about tiered storage access for data protection, scaling and ILM, this must-attend session is for you.

Author

Marc Staimer
Founder and CDS,
Dragon Slayer Consulting

Marc Staimer is the founder, senior analyst, and CDS of Dragon Slayer Consulting in Beaverton, OR. The consulting practice of over 12 years has focused in the areas of strategic planning, product development, and market development for technology products. With over 30 years of marketing, sales and business experience in infrastructure, storage, server, software, and virtualization, he’s considered one of the industry’s leading experts.

It can be tempting to stray from the security roadmap security professionals have put in place when data breaches like the Sony and Anthem breaches are all over the news. But experts say it's crucial to stick to the security basics.